2015
DOI: 10.1155/2015/475150
|View full text |Cite
|
Sign up to set email alerts
|

Secure Two-Party Distance Computation Protocols with a Semihonest Third Party and Randomization for Privacy Protection in Wireless Sensor Networks

Abstract: Scenarios in which two nodes who distrust each other in wireless sensor networks (WSNs) would like to know the distance between them are considered. The scenario is designed to protect the private information of WSNs, in this case each node's location, from the other nodes and from a passive attacker. The goal of the present work is to provide two novel and secure two-party distance computation protocols based on a semihonest model, the first with aid of a third party and the second based on randomization tech… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…(3) define max as max number of iterations; (4) iter = 0; (5) * = empty graph; //Optimization (6) repeat (7) for = 1 to do (8) for = 1 to do ( ) = ; (9) for = 1 and = 1 to do (10) if ( ̸ = ) then = ( , ) − ( , ); (11) end (12) repeat (13) Select two indexes and by using (5) and (6) and assign edge to ; (14) if (2) Customizing Privacy Requirement. A vulnerable node set ∈ and the sensitivity sen(V) for each V ∈ are specified by the enterprise in this step.…”
Section: Business Privacy-protection Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…(3) define max as max number of iterations; (4) iter = 0; (5) * = empty graph; //Optimization (6) repeat (7) for = 1 to do (8) for = 1 to do ( ) = ; (9) for = 1 and = 1 to do (10) if ( ̸ = ) then = ( , ) − ( , ); (11) end (12) repeat (13) Select two indexes and by using (5) and (6) and assign edge to ; (14) if (2) Customizing Privacy Requirement. A vulnerable node set ∈ and the sensitivity sen(V) for each V ∈ are specified by the enterprise in this step.…”
Section: Business Privacy-protection Systemmentioning
confidence: 99%
“…The attributes of WSNs may lead to the disclosure of sensitive information regarding the enterprise. This is susceptible to being collected and analyzed by an adversary, who can in turn harm the enterprise's business privacy [7]. Thus, when an enterprise employs a WSN for commercial transactions, the disclosure of sensitive or confidential information will be inevitable without effective business privacy protection.…”
Section: Introductionmentioning
confidence: 99%